{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:29Z","timestamp":1726064309254},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_28","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"715-739","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy Preservation of Electronic Health Record: Current Status and Future Direction"],"prefix":"10.1007","author":[{"given":"Anil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Ravinder","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos, J. W., Lauter, K., & Naehrig, M. (2014). Private predictive analysis on encrypted medical data. Journal of Biomedical Informatics, 50, 234\u2013243.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR2","first-page":"89","volume-title":"International Conference on Security and Privacy in Communication Systems","author":"M Li","year":"2010","unstructured":"Li, M., Yu, S., Ren, K., & Lou, W. (2010, September). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In International Conference on Security and Privacy in Communication Systems (pp. 89\u2013106). Berlin: Springer."},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/CLOUD.2011.31","volume-title":"Cloud Computing (CLOUD), 2011 IEEE International Conference on","author":"L Fan","year":"2011","unstructured":"Fan, L., Buchanan, W., Thummler, C., Lo, O., Khedim, A., Uthmani, O., & Bell, D. (2011, July). DACAR platform for eHealth services cloud. In Cloud Computing (CLOUD), 2011 IEEE International Conference on (pp. 219\u2013226). Los Alamitos: IEEE."},{"key":"28_CR4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1266840.1266849","volume-title":"Proceedings of the 12th ACM Symposium on Access Control Models and Technologies","author":"AC Squicciarini","year":"2007","unstructured":"Squicciarini, A. C., Hintoglu, A. A., Bertino, E., & Saygin, Y. (2007, June). A privacy preserving assertion based policy language for federation systems. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (pp. 51\u201360). New York: ACM."},{"key":"28_CR5","series-title":"Lecture notes in computer science","volume-title":"Data and applications security XXIII. DBSec 2009","author":"P Jurczyk","year":"2009","unstructured":"Jurczyk, P., & Xiong, L. (2009). Distributed anonymization: Achieving privacy for both data subjects and data providers. In E. Gudes & J. Vaidya (Eds.), Data and applications security XXIII. DBSec 2009 (Lecture notes in computer science) (Vol. 5645). Berlin: Springer."},{"issue":"4","key":"28_CR6","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas, A., & Khan, S. U. (2014). A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE Journal of Biomedical and Health Informatics, 18(4), 1431\u20131441.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1377\/hlthaff.19.6.140","volume":"19","author":"J Goldman","year":"2000","unstructured":"Goldman, J., & Hudson, Z. (2000). Virtual exposed: Privacy and eHealth. Health Affairs, 19, 140\u2013148.","journal-title":"Health Affairs"},{"key":"28_CR8","first-page":"1","volume-title":"International Conference on Information Systems Security","author":"C Clifton","year":"2013","unstructured":"Clifton, C., & Anandan, B. (2013, December). Challenges and opportunities for security with differential privacy. In International Conference on Information Systems Security (pp. 1\u201313). Berlin: Springer."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1145\/2020408.2020487","volume-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"N Mohammed","year":"2011","unstructured":"Mohammed, N., Chen, R., Fung, B., & Yu, P. S. (2011, August). Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 493\u2013501). New York: ACM."},{"key":"28_CR10","first-page":"441","volume-title":"Medical care compunetics on system sciences","author":"K Pommerening","year":"2004","unstructured":"Pommerening, K., & Reng, M. (2004). Secondary use of the EHR via pseudonymization. In Medical care compunetics on system sciences (pp. 441\u2013446). Amsterdam: IOS Press."},{"key":"28_CR11","volume-title":"Security and Privacy in Communication Networks. SecureComm 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"M Li","year":"2010","unstructured":"Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In S. Jajodia & J. Zhou (Eds.), Security and Privacy in Communication Networks. SecureComm 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 50). Berlin: Springer."},{"issue":"6","key":"28_CR12","doi-asserted-by":"publisher","first-page":"4005","DOI":"10.1007\/s10916-012-9873-8","volume":"36","author":"TS Chen","year":"2012","unstructured":"Chen, T. S., Liu, C. H., Chen, T. L., Chen, C. S., Bau, J. G., & Lin, T. C. (2012). Secure dynamic access control scheme of PHR in cloud computing. Journal of Medical Systems, 36(6), 4005\u20134020.","journal-title":"Journal of Medical Systems"},{"issue":"6","key":"28_CR13","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1002\/sec.817","volume":"7","author":"R Zhang","year":"2013","unstructured":"Zhang, R., Liu, L., & Xue, R. (2013). Role \u2013 Based and time bound access and management of HER data. Security and communication Networks, 7(6), 994\u20131015.","journal-title":"Security and communication Networks"},{"key":"28_CR14","first-page":"825","volume-title":"Proceedings of the AMIA Symposium","author":"F Ueckert","year":"2002","unstructured":"Ueckert, F., & Prokosch, H. U. (2002). Implementing security and access control mechanism for an healthcare record. In Proceedings of the AMIA Symposium (pp. 825\u2013829). Bethesda: American Medical Informatics Association."},{"issue":"5\u20136","key":"28_CR15","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.csi.2009.04.005","volume":"32","author":"J Hu","year":"2010","unstructured":"Hu, J., Chen, H. H., & Hou, T. W. (2010). A hybrid public key infrastructure solution (HPKI) for HIPAA privacy\/security regulations. Computer Standards & Interface, 32(5\u20136), 274\u2013280.","journal-title":"Computer Standards & Interface"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/1866870.1866883","volume-title":"Proceedings of the Tenth Annual ACM Workshop on Digital Rights Management","author":"M Jafari","year":"2010","unstructured":"Jafari, M., Safavi-Naini, R., Saunders, C., & Sheppard, N. P. (2010). Using digital rights management for securing data in a medical research environment. In Proceedings of the Tenth Annual ACM Workshop on Digital Rights Management (pp. 55\u201360). New York: ACM."},{"issue":"4","key":"28_CR17","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1080\/01947640701732148","volume":"28","author":"MA Rothstein","year":"2007","unstructured":"Rothstein, M. A. (2007). Health privacy in the electronic age. The Journal of Legal Medicine, 28(4), 487\u2013501.","journal-title":"The Journal of Legal Medicine"},{"issue":"4","key":"28_CR18","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10916-009-9276-7","volume":"34","author":"M Farzandipour","year":"2010","unstructured":"Farzandipour, M., Sadought, F., Ahmadi, M., & Karimi, I. (2010). Security requirement and solutions in electronic health record: Lessons learned from a comparative study. Journal of Medical Systems, 34(4), 629\u2013642.","journal-title":"Journal of Medical Systems"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"Privacy-preserving data mining","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C. C., & Philip, S. Y. (2008). A general survey of privacy-preserving data mining models and algorithms. In Privacy-preserving data mining (pp. 11\u201352). Boston: Springer."},{"issue":"05","key":"28_CR20","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557\u2013570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"28_CR21","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.jbi.2012.11.005","volume":"46","author":"S Mart\u00ednez","year":"2013","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., & Valls, A. (2013). A semantic framework to protect the privacy of electronic health records with non-numerical attributes. Journal of Biomedical Informatics, 46(2), 294\u2013303.","journal-title":"Journal of Biomedical Informatics"},{"issue":"3","key":"28_CR22","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J. L., Se\u00f1or, I. C., Lozoya, P. \u00c1. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46(3), 541\u2013562.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.protcy.2013.12.183","volume":"11","author":"A Ghazvini","year":"2013","unstructured":"Ghazvini, A., & Shukur, Z. (2013). Security challenges and success factors of electronic healthcare system. Procedia Technology, 11, 212\u2013219.","journal-title":"Procedia Technology"},{"key":"28_CR24","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis, A., Loukides, G., & Sun, J. (2014). Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics, 50, 4\u201319.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR25","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.jbi.2014.02.008","volume":"50","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., & Domingo-Ferrer, J. (2014). FRR: Fair remote retrieval of outsourced private medical records in electronic health networks. Journal of Biomedical Informatics, 50, 226\u2013233.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR26","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jbi.2014.01.014","volume":"50","author":"L Deleger","year":"2014","unstructured":"Deleger, L., Lingren, T., Ni, Y., Kaiser, M., Stouten borough, L., Marsolo, K., & Solti, I. (2014). Preparing an annotated gold standard corpus to share with extramural investigators for de-identification research. Journal of Biomedical Informatics, 50, 173\u2013183.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR27","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.jbi.2013.12.003","volume":"50","author":"SM Randall","year":"2014","unstructured":"Randall, S. M., Ferrante, A. M., Boyd, J. H., Bauer, J. K., & Semmens, J. B. (2014). Privacy-preserving record linkage on large real world datasets. Journal of Biomedical Informatics, 50, 205\u2013212.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jbi.2014.05.009","volume":"50","author":"G Loukides","year":"2014","unstructured":"Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., & Terrovitis, M. (2014). Disassociation for electronic health record privacy. Journal of Biomedical Informatics, 50, 46\u201361.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR29","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.jbi.2014.06.008","volume":"52","author":"D S\u00e1nchez","year":"2014","unstructured":"S\u00e1nchez, D., Batet, M., & Viejo, A. (2014). Utility-preserving privacy protection of textual healthcare documents. Journal of Biomedical Informatics, 52, 189\u2013198.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jbi.2014.04.002","volume":"50","author":"AWC Fu","year":"2014","unstructured":"Fu, A. W. C., Wang, K., Wong, R. C. W., Wang, J., & Jiang, M. (2014). Small sum privacy and large sum utility in data publishing. Journal of Biomedical Informatics, 50, 20\u201331.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR31","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.jbi.2014.01.011","volume":"50","author":"SM Meystre","year":"2014","unstructured":"Meystre, S. M., Ferr\u00e1ndez, \u00d3., Friedlin, F. J., South, B. R., Shen, S., & Samore, M. H. (2014). Text de-identification for privacy protection: A study of its impact on clinical text information content. Journal of Biomedical Informatics, 50, 142\u2013150.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR32","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","volume":"50","author":"F Yu","year":"2014","unstructured":"Yu, F., Fienberg, S. E., Slavkovi\u0107, A. B., & Uhler, C. (2014). Scalable privacy-preserving data sharing methodology for genome-wide association studies. Journal of Biomedical Informatics, 50, 133\u2013141.","journal-title":"Journal of Biomedical Informatics"},{"issue":"1","key":"28_CR33","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TLT.2016.2607747","volume":"10","author":"ME Gursoy","year":"2017","unstructured":"Gursoy, M. E., Inan, A., Nergiz, M. E., & Saygin, Y. (2017). Privacy-preserving learning analytics: Challenges and techniques. IEEE Transactions on Learning Technologies, 10(1), 68\u201381.","journal-title":"IEEE Transactions on Learning Technologies"},{"key":"28_CR34","doi-asserted-by":"publisher","first-page":"10562","DOI":"10.1109\/ACCESS.2017.2706947","volume":"5","author":"R Mendes","year":"2017","unstructured":"Mendes, R., & Vilela, J. P. (2017). Privacy-preserving data mining: Methods, metrics, and applications. IEEE Access, 5, 10562\u201310582.","journal-title":"IEEE Access"},{"key":"28_CR35","unstructured":"Majeed, A. (2018). Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data. Journal of King Saud University-Computer and Information Sciences. In press."},{"issue":"06","key":"28_CR36","doi-asserted-by":"publisher","first-page":"1850058","DOI":"10.1142\/S1793962318500587","volume":"9","author":"YR Kulkarni","year":"2016","unstructured":"Kulkarni, Y. R., & Senthil Murugan, T. (2016). Genetic grey wolf optimization and C-mixture for collaborative data publishing. International Journal of Modeling, Simulation, and Scientific Computing, 9(06), 1850058.","journal-title":"International Journal of Modeling, Simulation, and Scientific Computing"},{"key":"28_CR37","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2017.09.003","volume":"72","author":"LE Wang","year":"2018","unstructured":"Wang, L. E., & Li, X. (2018). A graph-based multifold model for anonymizing data with attributes of multiple types. Computers & Security, 72, 122\u2013135.","journal-title":"Computers & Security"},{"issue":"1","key":"28_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouel mehdi","year":"2018","unstructured":"Abouel mehdi, K., Beni-Hessane, A., & Khaloufi, H. (2018). Big healthcare data: Preserving security and privacy. Journal of Big Data, 5(1), 1.","journal-title":"Journal of Big Data"},{"key":"28_CR39","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2017.09.014","volume":"72","author":"A Anjum","year":"2018","unstructured":"Anjum, A., Choo, K. K. R., Khan, A., Haroon, A., Khan, S., Khan, S. U., & Raza, B. (2018). An efficient privacy mechanism for electronic health records. Computers & Security, 72, 196\u2013211.","journal-title":"Computers & Security"},{"key":"28_CR40","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.jbi.2014.03.002","volume":"50","author":"E Kamateri","year":"2014","unstructured":"Kamateri, E., Kalampokis, E., Tambouris, E., & Tarabanis, K. (2014). The linked medical data access control framework. Journal of Biomedical Informatics, 50, 213\u2013225.","journal-title":"Journal of Biomedical Informatics"},{"key":"28_CR41","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/11731139_74","volume-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"H Yu","year":"2006","unstructured":"Yu, H., Vaidya, J., & Jiang, X. (2006, April). Privacy-preserving SVM classification on vertically partitioned data. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 647\u2013656). Berlin: Springer."},{"key":"28_CR42","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1401890.1401904","volume-title":"Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J Brickell","year":"2008","unstructured":"Brickell, J., & Shmatikov, V. (2008, August). The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 70\u201378). New York: ACM."},{"key":"28_CR43","unstructured":"Wang, J., Zhang, Z., Yang, X., Zuo, L., & Kim, J. U. (2013). Data security and privacy of e-healthcare in electronic medical environment (Vol. 22, pp. 92\u201398). ASTL SIA."},{"key":"28_CR44","first-page":"195","volume-title":"International Symposium on Foundations of Health Informatics Engineering and Systems","author":"N Dong","year":"2011","unstructured":"Dong, N., Jonker, H., & Pang, J. (2011, August). Challenges in eHealth: From enabling to enforcing privacy. In International Symposium on Foundations of Health Informatics Engineering and Systems (pp. 195\u2013206). Berlin: Springer."},{"issue":"6","key":"28_CR45","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TIFS.2013.2255593","volume":"8","author":"H Lin","year":"2013","unstructured":"Lin, H., Shao, J., Zhang, C., & Fang, Y. (2013). CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Transactions on Information Forensics and Security, 8(6), 985\u2013997.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"28_CR46","unstructured":"Retrieved October 19, 2018, from https:\/\/www.thehindu.com\/news\/resources\/supreme-court-verdict-on-right-to-privacy\/article19551827.ece"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T15:39:41Z","timestamp":1613317181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_28","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}